Denial of Service in hapi
High severity
GitHub Reviewed
Published
Jun 7, 2018
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Published to the GitHub Advisory Database
Jun 7, 2018
Reviewed
Jun 16, 2020
Last updated
Jan 9, 2023
Versions of
hapi
prior to 11.1.3 are affected by a denial of service vulnerability.The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers.
This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hapi will continue to hold the socket open until timed out (default node timeout is 2 minutes).
Recommendation
Update to v11.1.3 or later
References